Login / Signup
Detecting Insider Malicious Activities in Cloud Collaboration Systems.
G. S. Smrithy
Alfredo Cuzzocrea
Ramadoss Balakrishnan
Published in:
Fundam. Informaticae (2018)
Keyphrases
</>
malicious activities
distributed systems
security issues
information systems
face recognition
low cost
computer systems
intrusion detection system
online social networks
insider threat